BYOD and Next-Generation Mobile Security

We will discuss various ways that enterprise mobile devices can be practically exploited by hackers to compromise user information on the device, and discuss the current state of mobile security solutions. We will talk about various application sandboxing solutions to secure the users' sensitive information and transactions even if the mobile device itself is compromised or hacked into.